Security and Privacy in New Computing Environments: 5th EAI International Conference, SPNCE 2022, Xi’an, China, December 30-31, 2022, Proceedings

Author:   Qi Jiang ,  Xinghua Li ,  Ding Wang
Publisher:   Springer International Publishing AG
Edition:   1st ed. 2023
Volume:   496
ISBN:  

9783031306228


Pages:   179
Publication Date:   26 April 2023
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $142.29 Quantity:  
Add to Cart

Share |

Security and Privacy in New Computing Environments: 5th EAI International Conference, SPNCE 2022, Xi’an, China, December 30-31, 2022, Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the 5th International Conference on Security and Privacy in New Computing Environments, SPNCE 2022, held in Xi’an, china, in December 30-31, 2022. The 12 full papers were selected from 38 submissions and are grouped in thematical parts as: authentication and key agreement; data security; network security.

Full Product Details

Author:   Qi Jiang ,  Xinghua Li ,  Ding Wang
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   1st ed. 2023
Volume:   496
Weight:   0.308kg
ISBN:  

9783031306228


ISBN 10:   3031306228
Pages:   179
Publication Date:   26 April 2023
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Authentication and key agreement.- User Authentication Using Body Vibration Characteristics.- An Improved Authenticated Key Agreement Protocol for IoT and Cloud Server.- Efficient two-party authentication key agreement protocol using reconciliation mechanism from lattice.- Anonymous and Practical Multi-Factor Authentication for Mobile Devices Using Two-Server Architecture.- Data security.- Cross-chain Data Auditing for Medical IoT Data.- Outsourced Privacy-Preserving SVM Classifier Model over Encrypted Data in IoT.- A Scheme of Anti Gradient Leakage of Federated Learning Based on Blockchain.- Analysis of a New Improved AES S-box Structure Rong.- Network security.- Social Internet of Tings trust management based on implicit social relationship.- Romeo: SGX-based Software Anti-Piracy Framework.- P-TECS: An Energy Balance Algorithm for Opportunistic Networks Integrating Multiple Node Attributes.- Network Situation Awareness Model based on Incomplete Information Game.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List